Download presentation
Presentation is loading. Please wait.
Published byMeredith Gibbs Modified over 9 years ago
1
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I
2
2 1.1 History The first network, known as ___________, was developed for the Department of __________ in the late 1960s. The WWW was developed primarily by _______________ in the 1980s and took off in the 1990s. The World Wide Web Consortium (_____) was created in 1994 to develop WWW standards. I personally remember seeing the first TV commercial that included a URL in January, 1996.
3
3 1.2 The Internet and the WWW Each computer on the Internet has an ___ address, which stands for Internet ___________. The _________ Name System (DNS) is used to link an IP address to a name, such as ibm.com. A local area network (LAN) of computers is connected to the Internet through an ISP (Internet Service __________). Communication over the Internet is enabled by a set of protocols known as __________. The ______ model involves different stack layers for describing network communication and protocols.
4
4 1.3 Protocols and Programs FTP (File __________ Protocol) is used to copy files from one computer to another over the Internet (see http://www.ftpplanet.com/ftpresources/basics.htm). http://www.ftpplanet.com/ftpresources/basics.htm FTP may have problems due to _________ software and transferred data are not __________. Email is sent using SMTP (_________ Mail Transfer Protocol) and often retrieved using POP3 (______ Office Protocol). Instant Messaging (IM) is not very standardized, but a popular approach uses Internet Relay _____ (IRC). Remote machine access can use Telnet or SSH.
5
5 1.3.6 Web Pages The main protocol used for communication between a browser and a Web server is _______, which stands for ___________ Transfer Protocol. The process for downloading a Web page: Enter a _____ in the browser address window. The URL is converted to an ____ address and a connection is made with the server via port ____. If the connection is made, the client extracts the _____ name from the URL and sends the request to the server. The server sends the page to the client and the ___________ is dropped.
6
6 1.4-1.6 Security, Tools, & Browsers Most Internet protocols are not secure (use plain ______). Secure versions of FTP and HTTP exist (SFTP/FTPS and HTTPS), allowing for authentication and ___________, primarily for e-commerce applications. Development environments and editors can be used to make things much easier. A Web browser is software that retrieves and presents files from a Web server. Some browsers vary in their capabilities and present options to the user (scripts, cache, cookies, etc.).
7
7 Creating a Site on Tripod.com Go to http://www.tripod.lycos.com/.http://www.tripod.lycos.com/ Select New Users: Sign Up Select Tripod Free Sign Up (free hosting displays ads) Complete Step 1: Membership Complete Step 2: Confirmation If your username is “cis205msu”, your URL is http://cis205msu.tripod.com/. http://cis205msu.tripod.com/ At http://www.tripod.lycos.com/build/index.html, you can use Tripod’s HTML Editor or File Manager.http://www.tripod.lycos.com/build/index.html Things are a lot easier if you use FrontPage or Dreamweaver to create, edit, and publish pages.
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.